Sciweavers

225 search results - page 30 / 45
» Privacy-enhanced social network routing in opportunistic net...
Sort
View
ISCC
2009
IEEE
262views Communications» more  ISCC 2009»
15 years 4 months ago
Babelchord: a social tower of DHT-based overlay networks
Chord is a protocol to distribute and retrieve information at large scale. It builds a large but rigid overlay network without taking into account the social nature and the underl...
Luigi Liquori, Cédric Tedeschi, Francesco B...
98
Voted
JSAC
2007
87views more  JSAC 2007»
14 years 9 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
PERCOM
2010
ACM
14 years 8 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
GIS
2009
ACM
15 years 4 months ago
Trajectory simplification method for location-based social networking services
The increasing availabilities of GPS-enabled devices have given rise to the location-based social networking services (LBSN), in which users can record their travel experiences wi...
Yukun Chen, Kai Jiang, Yu Zheng, Chunping Li, Neng...
91
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Bottleneck Routing Games in Communication Networks
—We consider routing games where the performance of each user is dictated by the worst (bottleneck) element it employs. We are given a network, finitely many (selfish) users, eac...
Ron Banner, Ariel Orda